Skip to main content

DescribeAlarmEventList

Description

call the DescribeAlarmEventList interface to obtain the alarm event information of the security alarm processing page. Alarm events are divided into two dimensions: alarm and exception. An alarm event contains multiple exception events.

Request Method

POST

Request Path

/apsara/route/Sas/DescribeAlarmEventList

Request Parameters Common Parameters

NameLocationTypeRequiredSample valueDescription
PageSizeBODYstringYes20The maximum number of pieces of data per page displayed during a paged query. The default value is 20.
AlarmEventNameBODYstringNoDDoS Trojanalarm event name.
LangBODYstringNozhthe language type of the request and receive message. zh: Chinese en: English
FromBODYstringYessasrequest source identification, fixed as sas.
DealedBODYstringNoYalarm event status. N: pending alarms Y: Alert processed
versionBODYstringNo2016-01-01version of api
RemarkBODYstringNodatabase_serveralarm name/asset information.
GroupIdBODYstringNotst***the group ID of the asset affected by the alarm event.
SourceIpBODYstringNo1.2.3.4access the IP address of the source.
CurrentPageBODYintegerYes1the page number of the current page displayed when paging query. The starting value is 1 and the default value is 1.
regionIdBODYstringYesNo sample value for this parameter.region id
AlarmEventTypeBODYstringNomalicious process (cloud killing)alarm event type.
LevelsBODYstringNoseriousthe risk level of alarm events. multiple severity levels are separated by commas (severity levels decrease). serious: Emergency suspicious: Suspicious mind: reminder
OperateErrorCodeList.NBODYrepeatlistNoignore. Successalarm event processing result code. The format is: operation type. Operation result code. includes the following operation types: Common: General operation deal: processing ignore: ignore offline_handled: Alarm confirmed mark_mis_info: whitelist rm_mark_mis_info: Cancel whitelist quara: isolation kill_and_quara: ordinary killing kill_virus: Deep Cleanup block_ip: Block manual_handled: manual processing operation result code: Success: Success Failure: failed AgentOffline: client offline

Return data

NameTypeSample valueDescription
DescriptionstringAfter hackers invade the server, in order to allow malicious backdoor programs to run persistently, hackers often write malicious SHELL scripts to planned tasks such as crontab and systemd.description of the alarm event.
EndTimelong1543740301000the number of milliseconds when the alarm event ends.
PageSizeinteger20The maximum number of pieces of data per page displayed during a paged query.
OperateErrorCodestringkill_and_quara. Successalarm processing result code.
AlarmEventNamestringexecute malicious commandalarm event name.
SecurityEventIdsstring270789ID of the associated exception.
GmtModifiedlong1569235879000the latest alarm occurrence time milliseconds.
Countinteger1the number of data on the current page displayed during paging query.
IntranetIpstring1.2.3.5the private IP of the affected asset instance.
HasTraceInfobooleantruewhether the alarm has traceability information. true: traceable false: no traceability
InternetIpstring1.2.3.4the public IP of the affected asset instance.
AlarmEventTypestringprocess exception behavioralarm event type.
Solutionstringplease check the malicious URL prompted in the alarm and the malicious files in the downloaded directory in time, and clean up the running malicious processes in time. If the command is executed on your own initiative, you can click on the console to mark it as a false positive.method for handling alarm events.
CanCancelFaultbooleanfalsecan it be unmarked as a false positive.
AlarmEventNameOriginalstringmalicious command execution precision defensethe original parent name of the alarm event.
RequestIdstring28267723-D857-4DD8-B295-013100000000request ID of the result.
InstanceIdstringi-e***affected asset instance ID.
StartTimelong1543740301000the start time of the alarm event.
SaleVersionstring1sales version supported by alarm event detection. 0: Basic version 1: Enterprise version
Dealedbooleanfalsewhether the alarm has been processed. true: processed false: pending
DataSourcestringaegis_***data source.
InstanceNamestringtest serverthe name of the affected asset instance.
CanBeDealOnLinebooleantruewhether alarm events can be handled online, such as blocking isolation, adding whitelist, ignoring, etc. true: supports online processing false: online processing is not supported
PageInfostructNo sample value for this parameter.page displays information.
TotalCountinteger1the total number of alarm events.
Uuidstring47900178-885d-4fa4-9d77-***the unique identifier of the associated instance.
CurrentPageinteger1the page number of the current page displayed when paging query.
SuspiciousEventCountinteger1the number of abnormal events associated.
AlarmUniqueInfostring8df914418f4211fbf756efe7a6f40cbcunique ID of alarm event.
Levelstringseriousthe risk level of the alarm event. serious: Emergency suspicious: Suspicious mind: reminder
SuspEventsarrayNo sample value for this parameter.alarm event information.

Example

Successful Response example

{
"Description":"After hackers invade the server,
in order to allow malicious backdoor programs to run persistently,
hackers often write malicious SHELL scripts to planned tasks such as crontab and systemd.",
"EndTime":"1543740301000",
"PageSize":"20",
"OperateErrorCode":"kill_and_quara. Success",
"AlarmEventName":"execute malicious command",
"SecurityEventIds":"270789",
"GmtModified":"1569235879000",
"Count":"1",
"IntranetIp":"1.2.3.5",
"HasTraceInfo":"true",
"InternetIp":"1.2.3.4",
"AlarmEventType":"process exception behavior",
"Solution":"please check the malicious URL prompted in the alarm and the malicious files in the downloaded directory in time,
and clean up the running malicious processes in time. If the command is executed on your own initiative,
you can click on the console to mark it as a false positive.",
"CanCancelFault":"false",
"AlarmEventNameOriginal":"malicious command execution precision defense",
"RequestId":"28267723-D857-4DD8-B295-013100000000",
"InstanceId":"i-e***",
"StartTime":"1543740301000",
"SaleVersion":"1",
"Dealed":"false",
"DataSource":"aegis_***",
"InstanceName":"test server",
"CanBeDealOnLine":"true",
"PageInfo":"",
"TotalCount":"1",
"Uuid":"47900178-885d-4fa4-9d77-***",
"CurrentPage":"1",
"SuspiciousEventCount":"1",
"AlarmUniqueInfo":"8df914418f4211fbf756efe7a6f40cbc",
"Level":"serious",
"SuspEvents":""
}

Failed Response example

{
"errorSample":
{
"resultCode":-1,
"resultMsg":"system error",
"result":null
}

}